CONCERTIUM CYBERSECURITY & IT BLOG

10 Ransomware Defense Strategies to Deploy in 2023

10 Ransomware Defense Strategies to Deploy in 2023

Ransomware attacks have advanced significantly since the first reported incident more than 30 years ago. As today's attackers utilize more sophisticated delivery methods and leverage readily available malware to target vulnerable organizations for financial gain, it's...

read more
Ransomware Trends to Watch in 2023

Ransomware Trends to Watch in 2023

Ransomware attacks continue to grow in sophistication and effectiveness. The reported incidents in 2022 were much more damaging and costly to address than ever before. According to IBM’s data breach report for 2022, the share of breaches caused by ransomware increased...

read more
From cost center to cost mitigation

From cost center to cost mitigation

What's the biggest thing holding you back from making cybersecurity a priority? For most CISOs and security executives, it's the fact that cybersecurity is perceived as a cost center rather than part of an overall cost mitigation strategy. Cost Center Mentality...

read more
Suddenly CISO Series: Avoiding the post-merger hangover

Suddenly CISO Series: Avoiding the post-merger hangover

Mergers and acquisitions create huge growth opportunities — but, as with any good thing, they come with transition challenges, especially in security. Pre-merger planning activities are often focused within strategic, operational, and legal teams, while other groups...

read more
The case for cloud-hosted virtual desktops

The case for cloud-hosted virtual desktops

Cloud-Hosted Virtual Desktops are part of a cutting-edge technology approach that presents companies with many advantages in terms of cost, speed, sustainability, and more — but particularly in the critical area of cybersecurity. But first, what is a Cloud-Hosted...

read more
Cybersecurity roles for board members

Cybersecurity roles for board members

Cyber-threats and data breaches can cause major disruptions to large and small companies. Today, businesses are being forced to adapt. What used to be the standard — relying on modern firewalls and insulating key corporate functions — has given way to a far more...

read more
Don’t do this! Cybersecurity tips

Don’t do this! Cybersecurity tips

Electronic scams — including those propagated by email or websites — can cause major headaches (or worse) for companies and individuals. Especially during the holidays, there seems to be an uptick in scammers attempting to prey on the increase of online payments. For...

read more